mirror of
https://github.com/pseXperiments/icicle.git
synced 2026-01-08 23:17:54 -05:00
Update poseidon.md
Fixed image quality
This commit is contained in:
@@ -16,7 +16,9 @@ Poseidon starts with the initialization of its internal state, which is composed
|
||||
|
||||
This is done to prevent collisions and to prevent certain cryptographic attacks by ensuring that the internal state is sufficiently mixed and unpredictable.
|
||||
|
||||

|
||||

|
||||
|
||||
|
||||
|
||||
## Applying full and partial rounds
|
||||
|
||||
@@ -26,7 +28,8 @@ To generate a secure hash output, the algorithm goes through a series of "full r
|
||||
|
||||
### Full rounds
|
||||
|
||||

|
||||

|
||||
|
||||
|
||||
**Uniform Application of S-box:** In full rounds, the S-box (a non-linear transformation) is applied uniformly to every element of the hash function's internal state. This ensures a high degree of mixing and diffusion, contributing to the hash function's security. The functions S-box involves raising each element of the state to a certain power denoted by `α` a member of the finite field defined by the prime `p`; `α` can be different depending on the implementation and user configuration.
|
||||
|
||||
@@ -42,7 +45,8 @@ To generate a secure hash output, the algorithm goes through a series of "full r
|
||||
|
||||
The user of Poseidon can often choose how many partial or full rounds he wishes to apply; more full rounds will increase security but degrade performance. The choice and balance is highly dependent on the use case.
|
||||
|
||||

|
||||

|
||||
|
||||
|
||||
## Using Poseidon
|
||||
|
||||
|
||||
Reference in New Issue
Block a user